1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paraphin [41]
3 years ago
13

You have recently been hired as the staff attorney at a growing independent film studio in Van Nuys, California. Among your duti

es are to carefully review films’ content prior to their distribution, monitor all of the legal issues that may arise after the film has been released to theaters as well as when it is released on DVD, as streaming digital content or for broadcast television. In an essay of approximately 250 words, describe what you focus on as the film before a feature film’s worldwide release and premiere, issues that may be of concern to you when it is in theaters, and finally, what you will focus on when that film is released for a second time on DVD, online and broadcast television.
Computers and Technology
1 answer:
expeople1 [14]3 years ago
4 0

Answer: dude it’s all mussed in where the question

Explanation:

You might be interested in
Camera shock might happen if you do which of the following to your camera?
goldenfox [79]
The answer is
<span>A. Put it underwater </span>
7 0
3 years ago
Read 2 more answers
The following relation schema can be used to register information on the repayments on micro loans.
Kruka [31]

Answer:

Check the explanation

Explanation:

Answer a):

From the given information, we can derive the following set of functional dependencies;

Borrower_id → name [given: every borrower is identified with an unique id]

Borrower_id → address [given: each borrower has only one address]

Borrower_id, Requestdate → loanamount [given: more than one loan cannot be requested by a single borrower]  

Borrower_id, requestdate, repayment_date →repayment_amount [given: a borrower can make multiple repayments on a single day, but not on a single loan]

From the above set of FDs, it is evident that we can uniquely identify all the other attributes of Repayment table, if we know the values of (borrower_id, requestdate, repayment_date). That is,

Borrower_id, requestdate, repayment_date →name, address, loanamount, repayment_amount.

Hence, attributes (Borrower_id, requestdate, repayment_date) together forms a candidate key.

Answer b):

Is the given relation Repayment is in 1NF?  

Yes. It has a key. Hence, we can make unique identification of records.

Is the given relation is in 2NF?  

No. We have the following partial key dependencies.  

1. We can easily derive name and address of every borrower if we know the borrower_id from the FDs Borrower_d →name, and Borrower_id →address.

2. We can derive the loanamount if we know borrower_id, and requestdate from the FD Borrower_id, Requestdate → loanamount.

Hence, the relation Repayment is not in 2NF. To convert it into a 2NF relation, we can decompose Repayment into the following relations;

Borrower (Borrower_id, Name, Address)

Borrower_loan (Borrower_id, Requestdate, Loanamount)

Repayment (Borrower_id, Requestdate, Repayment_date, Repayment_amount)

From the derived FDs, we know that all these tables are in 2NF.

Are these tables in 3NF?  

Yes. There are no transitive dependencies present in the above tables’ set of functional dependencies. Hence, we would say that all these tables are in 3NF.

Are these tables in BCNF?  

Yes. There are no more than one candidate keys present in the above set of tables. Hence the following decomposed tables are in Boyce-Codd Normal Form.

Borrower (Borrower_id, Name, Address)

Borrower_loan (Borrower_id, Requestdate, Loanamount)

Repayment (Borrower_id, Requestdate, Repayment_date, Repayment_amount)

6 0
4 years ago
Given that Apache and Internet Information Services (IIS) are the two most popular web application servers for Linux and Microso
timama [110]

Answer:

One should continuously engage in Consistent testing of pin, and also keep monitoring all unauthorized activities.

8 0
3 years ago
A computer has a word length of 8 bits (including sign). if 2’s complement is used to represent negative numbers, what range of
iVinArrow [24]
Two's-complement notation can represent all integers from - 2^(N-1) to 2^(N-1) - 1, where N is the word length of the computer. So, in your example, the computer could store all integers from -128 to 127 inclusive. 

<span>One's-complement notation can represent all integers from - 2^(N-1) - 1 to 2^(N-1) - 1, where N is the word length of the computer. So, in your example, the computer could store all integers from -127 to 127 inclusive</span>
5 0
3 years ago
Why is a class an excellent representation of an abstract data type?
JulsSmile [24]

Answer:

 A class is an good representation of the abstract data type as it is represented independently. For implementing a class, it is use to specify the interface for an abstract class.

Class is one of the type of abstract data type for the objects that whose behavior is basically define by the set of operations and values. It is known as abstract as, it provide an implementation independently.

When the class is using in an abstract data type, then it refers as hidden representation of the data. In this modern era, class is use for the implementation of the abstract data type.

6 0
3 years ago
Other questions:
  • What would be some long- term goals.
    11·1 answer
  • 3-Write a program in some language that has both static and stack dynamic local variables in subprograms. Create six large (at l
    9·2 answers
  • What is also known as a visual aid in presentation
    15·1 answer
  • Text can be easily moved from one location to another using _____.
    15·1 answer
  • NAT is able to stop ________. Group of answer choices a) scanning probes sniffers from learning anything about the internal IP a
    8·2 answers
  • These 2 questions PLEASEEE (:
    14·1 answer
  • Sampson runs his own online business, and much of his success depends on the reliability and accuracy of various online data. Ho
    11·1 answer
  • Identify a characteristic that is a disadvantage of cloud-based hosting.
    11·1 answer
  • What are three coding languages that are used to build websites?
    12·1 answer
  • 2. Which one of the following is the purpose of relating tables in a database?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!